If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

There are a multitude of different ways to install a keylogger and most of them don't involve a hacker. Additionally, no telling how long it has been there. Fortunately Spy Doctor found it for you! As far a linking it directly to your estranged, that's most likely not going to happen. The old days of the IP leading to a person/exact location have all but perished. An example is my IP Address is dynamically assigned, meaning it changes everytime I reboot my ADSL Modem, but even if you resolved any of my IP's they indicate a location that is over 200 miles away from my actual location. Additionally, your ISP will not give out personally information about the IP assignment without a court order.

I note that you said, "wireless laptop". Does he have access to the same wireless access point (router)?

Anyway, I believe the best course of action is to get the local police involved if it happens again. It is stalking, harrassment, and probably violates several other laws. If it does show up again, don't delete the keylogger. Rather take your laptop to the cop shop and let them see it for themselves. Heck you might want to go down there in advance and talk with them to what they can do for you.

The program you mentioned can be set to email logs out. Have a look at the setting in the program an see. Have a look through the 'sent' folder of your email program. You might just see a message that would tell you everything you need.

Another possibility is that he somehow has physical access to the box. In that case *you* need to use a keylogger, or better a surveilance camera.

From Sus: Thank you for your reply RELYT. You are very knowledgable about this subject. I have already called the cops, filed a report, and have a call out to the county attorney. As for evidence, I printed out the Spy Doctor report, detailing the PC Acme infection. Question: In Event Viewer, I noticed 13 anonymous log on USERs since June 29th? Is that the source?

Tomorrow, I am having a tech expert come over to see if he can trace the attack source, but based on what you say, I shouldn't get my hopes up. I wonder, though, if we do a "System Restore" whether we can look into the source better???
Thanks. Sus

I think only my estranged has access to the wireless, and, based on some nasty things he's done to me, i.e. disconnected my phone, threatened to take away my car, closed accounts, etc...I am certain he's the source.

The best thing to do now is unplug your computer and wait for the professionals.

In any case :

It is not so simple as just typing in a password on his end and having access to your computer. This is called a 'back door' and requires a seperate program -- one that your antispyware software should have picked up. As far as I can see the keylogger doesn't itself allow this, though I stand to be corrected. What this program does is save logs off all your keystrokes. And :

Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis (NET and PRO versions only).

If he is doing it the easy way, then he has configured it to send him emails of the logs, presumably through your email address. If so, then they will be stored in your 'sent' folder.

No so, if the key logger is using its own smtp or pop3 engine, it is not (necessarily) using the client email client. The email client software saves a copy of sent mail, not the mail protocol itself. I have not looked into the specific key logger. Let me know if I'm mistaken.

edit:

The best thing to do now is unplug your computer and wait for the professionals.